{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:46:30Z","timestamp":1725471990467},"reference-count":16,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387346540"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-34747-9_15","type":"book-chapter","created":{"date-parts":[[2006,10,8]],"date-time":"2006-10-08T19:56:39Z","timestamp":1160337399000},"page":"139-148","source":"Crossref","is-referenced-by-count":3,"title":["Anomaly Detection using prior knowledge: application to TCP\/IP traffic"],"prefix":"10.1007","author":[{"given":"Alberto","family":"Carrascal","sequence":"first","affiliation":[]},{"given":"Jorge","family":"Couchet","sequence":"additional","affiliation":[]},{"given":"Enrique","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Manrique","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"CSI, Computer Security Institute. 2004 CS\/\/FBI Computer Crime and Security Survey. (2004); http:\/\/www.gocsi.com\/.","DOI":"10.1016\/S1361-3723(04)00052-1"},{"key":"15_CR2","volume-title":"Intrusion Detection and Correlation-Challenges and Solutions","author":"C. Kruegel","year":"2005","unstructured":"C. Kruegel, F. Valeur, and G. Vigna, Intrusion Detection and Correlation-Challenges and Solutions (Springer Verlag, New York, 2005)."},{"key":"15_CR3","unstructured":"CERT Coordination Center, CERT\/CC Statistics (1988\u20132005); http:\/\/www.cert.org\/stats\/."},{"key":"15_CR4","unstructured":"E. Carter. Cisco Secure Intrusion Detection System (Cisco Press, 2001)."},{"key":"15_CR5","unstructured":"T.M. Mitchell. Machine Learning (McGraw-Hill, 1997)."},{"key":"15_CR6","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/AINA.2005.191","volume":"2","author":"D.S. Kim","year":"2005","unstructured":"D.S. Kim, H.-N. Nguyen, and J.S. Park, Genetic algorithm to improve SVM based network intrusion detection system, 19th International Conference on Advanced Information Networking and Applications, Vol. 2, (2005), pp.155\u2013158.","journal-title":"19th International Conference on Advanced Information Networking and Applications"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"M. Markou","year":"2003","unstructured":"M. Markou, and S. Singh, Novelty Detection: A Review, Part II: Neural Network Based Approaches. Signal Processing, Vol. 83 (2003), pp. 2499\u20132521.","journal-title":"Signal Processing"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S Stolfo, A Geometric Framework for Unsupervised Anomaly Detection: Detecting intrusions in unlabeled data, In D. Barbara and S. Jajodia, editors, Applications of Data Mining in Computer Security (Kluwer, 2002).","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"T. Kohonen. Self Organizing Maps, Third Extended Edition (Springer, 2001).","DOI":"10.1007\/978-3-642-56927-2"},{"key":"15_CR10","unstructured":"H.G. Kayacik. Hierarchical Self Organizing Map Based IDS on KDD Benchmark. Master\u2019s thesis, Dalhousie University (2003)."},{"key":"15_CR11","unstructured":"P. Lichodzijewski, A.N. Zincir-Heywood, and M.I. Heywood, Host-based Intrusion Detection Using Self-Organizing Maps, IEEE World Congress on Computational Intelligence, International Joint Conference on Neural Networks, IJCNN (2002)."},{"key":"15_CR12","unstructured":"Bro. Intrusion detection system (2005); http:\/\/www.bro-ids.org\/"},{"key":"15_CR13","unstructured":"Snort. open source network intrusion prevention and detection system (2005); http:\/\/www.snort.org."},{"key":"15_CR14","unstructured":"A. S. Tanenbaum. Computer Networks (2nd Edition, Prentice-Hall, 1989)."},{"key":"15_CR15","unstructured":"MIT Lincoln Laboratory (1998); http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/data index.html."},{"key":"15_CR16","unstructured":"SOM PAK, Helsinki University of Technology, Laboratory of Computer and Information Science (2005); http:\/\/www.cis.hut.fi\/research\/som_lvq_pak.shtml."}],"container-title":["IFIP International Federation for Information Processing","Artificial Intelligence in Theory and Practice"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-34747-9_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T03:30:40Z","timestamp":1683603040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-34747-9_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387346540"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-34747-9_15","relation":{},"subject":[]}}